• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • Tagged with
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

DATA SECURITY IN SOLID STATE DISKS

Fitzgerald, Alan 10 1900 (has links)
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada / Solid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state disk storage, access controls, and data elimination in relation to various telemetry scenarios. The reader will be introduced to the operational considerations of solid state disk data security and the underlying technical concepts of how these are implemented.
2

Data Remanence : Secure Deletion of Data in SSDs

Homaidi, Omar Al January 2009 (has links)
The ongoing fast pace research in hardware and software technology has resulted in memory devices efficient and faster than ever before. However, the issue of security of the contained data is rarely discussed. There is an evident capability of these devices to retain data even when it is erased. In this thesis, a study is conducted to qualitatively analyze the extent to which data deletion is important and why secure deletion should be applied. Afterwards, following the sequential exploratory procedure, this paper presents an analysis of methods used to recover the data after being deleted in addition to the techniques used to securely delete this data. Based on this study, some recommendations are made to ensure the safety of data.

Page generated in 0.0579 seconds